Announced the release of the new version of Nmap 7.94, which is a popular network scanner designed to audit the network and detect active network services.
In this new version of Nmap 7.94 it is highlighted that the GUI of Zenmap and the Ndiff utility have been converted to use Python 3. Zenmap uses the PyGObject library instead of PyGTK to generate the graphical interface.
Another of the changes that stands out in the new version is that it added support for silent installation mode (/S) to the installer for Windows, in addition to the fact that the memory consumption has been optimized along with performance improved code for OS detection, service name lookup, matching, and relay checks.
It is also highlighted that Parsing of domain names returned by DNS servers has been improved. To counter attacks through manipulation of DNS server responses, recurrence protection has been added and a domain name size limit has been implemented.
In addition to that, the signature databases have been updated to identify network applications and operating systems and in these 22 new operating system signatures were added that identify the latest versions of Windows, iOS, macOS, Linux and BSD systems. The total number of signatures has reached 5700.
The Npcap library was updated to version 1.75 Used to capture and substitute packets on Windows, the library is developed by the Nmap project as a replacement for WinPcap, built using the modern NDIS 6 LWF Windows API and demonstrates increased performance, security, and reliability.
On the other hand, it is mentioned that the NPSL license (Nmap Public Source License) has been updated to clarify that the requirements for derivative works and other terms of the license apply only to parties who have accepted the license in exchange for receiving special rights, such as the right to redistribute Nmap. In this case, the participating party can do what they want in accordance with copyright provisions, such as fair use, and the Nmap developers will not try to control their work.
Of the other changes that stand out from this new version:
- Significantly accelerated data transfer via Ncat on Windows platform (issue with 125 ms delay appearing with each STDIN read has been resolved).
- Added a new tftp version of the NSE script that requests a non-existent file from the TFTP server and determines the tftp server name and version based on the error text.
- The Ncat utility allows accepting "connections" from multiple hosts over UDP when using the listen mode with the --keep-open option, as well as being able to use the "-broker" and "--chat" modes over UDP. .
- In service scanning mode (-sV), it was possible to determine the UDP services available through the DTLS tunnel (similar to TCP services using SSL/TLS encryption).
- In the Ncat utility, when running in listening mode and the “–udp –ssl” options are specified, DTLS is used to protect incoming connections.
Finally if you want to know more about it about this new version, you can check the details in the following link.
How to install Nmap 7.94 on Linux?
For those who are interested in being able to install Nmap along with its other tools on their system, They can do it by following the steps we share below.
Although we can resort to compiling the source code of the application in our system. The code can be downloaded and compiled by executing the following:
wget https://nmap.org/dist/nmap-7.94.tar.bz2 bzip2 -cd nmap-7.94.tar.bz2 | tar xvf - cd nmap-7.94 ./configure make su root make install
In the case of distributions with support for RPM packages, they can install the Nmap 7.90 package by opening a terminal and executing the following commands:
rpm -vhU https://nmap.org/dist/nmap-7.94-1.x86_64.rpm rpm -vhU https://nmap.org/dist/zenmap-7.94-1.noarch.rpm rpm-vhU https://nmap.org/dist/ncat-7.94-1.x86_64.rpm rpm -vhU https://nmap.org/dist/nping-0.7.94-1.x86_64.rpm